-
Notifications
You must be signed in to change notification settings - Fork 285
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enabling authentication with service principal #784
Comments
#747 is supporting this feature. |
is this stuck @xuzhang3 at the moment or can you tweak @davidcorrigan714 code to help get it through. This would be a killer feature |
@gabrielmccoll I do not have the push permission to @davidcorrigan714's PR and he/she going to be a little while before he/she have time to do any updates. One way is merge/cherry pick the changes into my branch. |
thank you both, much appreciated. sadly I don't know go but I'm certainly cheering you both on |
Any update on this? |
Community Note
Description
At the moment this issue is written, the only way of authentication for this provider is using personal access token. Sadly, it was the only way of authentication on ADO, so I can understand that. However, ADO recently announced Service Principal and Managed Identity support. I believe this will help lot of teams/individual here, if we have such a way to authenticate
Announcement
New or Affected Resource(s)
provider "azuredevops"
Potential Terraform Configuration
Something like following configuration would be great to have.
References
https://devblogs.microsoft.com/devops/introducing-service-principal-and-managed-identity-support-on-azure-devops/
The text was updated successfully, but these errors were encountered: